Movatterモバイル変換


[0]ホーム

URL:


IL195081A0 - Acquisition of malicious code using active learning - Google Patents

Acquisition of malicious code using active learning

Info

Publication number
IL195081A0
IL195081A0IL195081AIL19508108AIL195081A0IL 195081 A0IL195081 A0IL 195081A0IL 195081 AIL195081 AIL 195081AIL 19508108 AIL19508108 AIL 19508108AIL 195081 A0IL195081 A0IL 195081A0
Authority
IL
Israel
Prior art keywords
acquisition
malicious code
active learning
learning
active
Prior art date
Application number
IL195081A
Original Assignee
Deutche Telekom Ag
Univ Ben Gurion
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deutche Telekom Ag, Univ Ben GurionfiledCriticalDeutche Telekom Ag
Priority to IL195081ApriorityCriticalpatent/IL195081A0/en
Priority to EP09012448Aprioritypatent/EP2182458A1/en
Publication of IL195081A0publicationCriticalpatent/IL195081A0/en

Links

Classifications

Landscapes

IL195081A2008-11-032008-11-03Acquisition of malicious code using active learningIL195081A0 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
IL195081AIL195081A0 (en)2008-11-032008-11-03Acquisition of malicious code using active learning
EP09012448AEP2182458A1 (en)2008-11-032009-10-01Acquisition of malicious code using active learning

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
IL195081AIL195081A0 (en)2008-11-032008-11-03Acquisition of malicious code using active learning

Publications (1)

Publication NumberPublication Date
IL195081A0true IL195081A0 (en)2011-08-01

Family

ID=41571467

Family Applications (1)

Application NumberTitlePriority DateFiling Date
IL195081AIL195081A0 (en)2008-11-032008-11-03Acquisition of malicious code using active learning

Country Status (2)

CountryLink
EP (1)EP2182458A1 (en)
IL (1)IL195081A0 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8499350B1 (en)2009-07-292013-07-30Symantec CorporationDetecting malware through package behavior
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US9202047B2 (en)2012-05-142015-12-01Qualcomm IncorporatedSystem, apparatus, and method for adaptive observation of mobile device behavior
US9298494B2 (en)2012-05-142016-03-29Qualcomm IncorporatedCollaborative learning for efficient behavioral analysis in networked mobile device
US9690635B2 (en)2012-05-142017-06-27Qualcomm IncorporatedCommunicating behavior information in a mobile computing device
US9609456B2 (en)2012-05-142017-03-28Qualcomm IncorporatedMethods, devices, and systems for communicating behavioral analysis information
US9324034B2 (en)2012-05-142016-04-26Qualcomm IncorporatedOn-device real-time behavior analyzer
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
US9330257B2 (en)2012-08-152016-05-03Qualcomm IncorporatedAdaptive observation of behavioral features on a mobile device
US9747440B2 (en)2012-08-152017-08-29Qualcomm IncorporatedOn-line behavioral analysis engine in mobile device with multiple analyzer model providers
US9319897B2 (en)2012-08-152016-04-19Qualcomm IncorporatedSecure behavior analysis over trusted execution environment
US9495537B2 (en)2012-08-152016-11-15Qualcomm IncorporatedAdaptive observation of behavioral features on a mobile device
US9111095B2 (en)2012-08-292015-08-18The Johns Hopkins UniversityApparatus and method for identifying similarity via dynamic decimation of token sequence n-grams
US9684870B2 (en)2013-01-022017-06-20Qualcomm IncorporatedMethods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
US9686023B2 (en)2013-01-022017-06-20Qualcomm IncorporatedMethods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
US10089582B2 (en)2013-01-022018-10-02Qualcomm IncorporatedUsing normalized confidence values for classifying mobile device behaviors
US9742559B2 (en)2013-01-222017-08-22Qualcomm IncorporatedInter-module authentication for securing application execution integrity within a computing device
US9491187B2 (en)2013-02-152016-11-08Qualcomm IncorporatedAPIs for obtaining device-specific behavior classifier models from the cloud
US9053434B2 (en)2013-03-152015-06-09Hewlett-Packard Development Company, L.P.Determining an obverse weight
RU2568285C2 (en)*2013-09-302015-11-20Закрытое акционерное общество "Лаборатория Касперского"Method and system for analysing operation of software detection rules
EP3139297B1 (en)*2014-06-112019-04-03Nippon Telegraph and Telephone CorporationMalware determination device, malware determination system, malware determination method, and program
WO2015200211A1 (en)2014-06-222015-12-30Webroot Inc.Network threat prediction and blocking
US10708296B2 (en)2015-03-162020-07-07Threattrack Security, Inc.Malware detection based on training using automatic feature pruning with anomaly detection of execution graphs
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
US20180005136A1 (en)*2016-07-012018-01-04Yi GaiMachine learning in adversarial environments
US10489589B2 (en)*2016-11-212019-11-26Cylance Inc.Anomaly based malware detection
US10817603B2 (en)2017-08-292020-10-27Target Brands, Inc.Computer security system with malicious script document identification
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US11444957B2 (en)*2018-07-312022-09-13Fortinet, Inc.Automated feature extraction and artificial intelligence (AI) based detection and classification of malware
US11416622B2 (en)*2018-08-202022-08-16Veracode, Inc.Open source vulnerability prediction with machine learning ensemble
CN109858251B (en)*2019-02-262023-02-10哈尔滨工程大学 Malicious code classification and detection method based on Bagging ensemble learning algorithm
EP3918500B1 (en)*2019-03-052024-04-24Siemens Industry Software Inc.Machine learning-based anomaly detections for embedded software applications
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
KR102068507B1 (en)*2019-07-112020-01-21(주)시큐레이어Post-processing method for determining reliability of machine learning model and the device using the same
US11374946B2 (en)2019-07-192022-06-28Palo Alto Networks, Inc.Inline malware detection
US12430437B2 (en)2019-07-192025-09-30Palo Alto Networks, Inc.Specific file detection baked into machine learning pipelines
CN111178435B (en)*2019-12-302022-03-22山东英信计算机技术有限公司Classification model training method and system, electronic equipment and storage medium
US11977632B2 (en)*2020-04-232024-05-07Booz Allen Hamilton Inc.Evaluating automatic malware classifiers in the absence of reference labels
CN112861135B (en)*2021-04-122024-05-31中南大学Malicious code detection method based on attention mechanism
CN118885744B (en)*2024-09-242024-12-31山东海纳智能装备科技股份有限公司Online monitoring method and system for deformation of mine filling body

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8037535B2 (en)*2004-08-132011-10-11Georgetown UniversitySystem and method for detecting malicious executable code

Also Published As

Publication numberPublication date
EP2182458A1 (en)2010-05-05

Similar Documents

PublicationPublication DateTitle
IL195081A0 (en)Acquisition of malicious code using active learning
GB2463034B (en)Autoinjection devices
DK2475294T3 (en) Implantable sensor
GB0814747D0 (en)Autoinjection devices
GB0823693D0 (en)Autoinjector
IL213619A0 (en)Treatment
BRPI0910854A2 (en) treatment methods
IL215310A0 (en)Organic compounds and their uses
EP2486509A4 (en) PLATFORM SECURITY
GB0802116D0 (en)Treatment
GB0822011D0 (en)Treatment
ZA201102604B (en)Alkylcyclohexylethers of dihydrotetraazabenzoazulenes
GB0707750D0 (en)Treatment of organic matter
PL2133419T3 (en)Uses of cyanophycin beta-dipeptides
LT3150178T (en) STIMULATOR
GB0811992D0 (en)Treatment
EP2443124A4 (en) 1,3,8-TRIAZASPIRO [4,5] SUBSTITUTED DECK-2,4-DIONES
GB201210493D0 (en)Sunless tanning with pyranones and furanones
GB0812999D0 (en)Detection of microorganisms
EP2494484A4 (en)Malicious code detection
ZA201305000B (en)Organic soil treatment
GB0820972D0 (en)Treatment
IL207848A0 (en)Artificial enzymes
PT2358215E (en) METHOD OF PROTECTION OF ACTIVE SUBSTANCES USING GLICEROL
GB0821319D0 (en)Easy walker

[8]ページ先頭

©2009-2025 Movatter.jp